首页> 外文会议>Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop >Designing Security for In-vehicle Networks: A Body Control Module (BCM) Centered Viewpoint
【24h】

Designing Security for In-vehicle Networks: A Body Control Module (BCM) Centered Viewpoint

机译:设计车载网络的安全性:以车身控制模块(BCM)为中心的观点

获取原文

摘要

The overabundance of attacks reported on in-vehicle networks triggered reactions from both the academic research communities and industry professionals. However, designing security for in-vehicle networks is a challenging task and it is yet unclear to what extent current proposals are suitable for real world vehicles. In this work, we advocate the use of a top-down approach in which we analyze the functionalities along with reported attacks. Due to the abundance of in-vehicle services and the associated large number of Electronic Control Units (ECUs), we center our analysis on a key subsystem from the car: the Body Control Module (BCM). The rationale behind choosing this particular module comes from at least three key factors: i) a large number of components that aredirectly linked to the BCM were target of previously reported attacks (e.g., keys and electronic immobilizes, tire sensors, diagnostic ports, etc.), ii) by design, body components are generally exposed to the outside and it is reasonable to assumethat adversaries will frequently have access to peripherals controlled by the BCM, iii) the BCM controls subsystems thatare both attractive from an economic perspective (e.g., accessto the car), or from a safety perspective (e.g., seat-belts, lights, etc.). Our discussion is entailed by a concrete analysis of therisks of reported attacks and preferable security designs.
机译:车载网络上报告的攻击过多,引发了学术研究界和行业专家的反应。但是,为车载网络设计安全性是一项艰巨的任务,目前尚不清楚当前的建议在多大程度上适合现实世界的车辆。在这项工作中,我们提倡使用自上而下的方法,在此方法中我们分析功能以及报告的攻击。由于车载服务的丰富和相关的大量电子控制单元(ECU),我们将分析集中在汽车的一个关键子系统上:车身控制模块(BCM)。选择此特定模块的基本原理至少来自三个关键因素:i)与BCM直接关联的大量组件是先前报告的攻击的目标(例如,钥匙和电子防盗器,轮胎传感器,诊断端口等)。 ),ii)通过设计将身体的各个组件通常暴露在外面,并且可以合理地假设对手将经常访问由BCM控制的外围设备,iii)BCM控制从经济角度来看都具有吸引力的子系统(例如,汽车)或从安全角度(例如安全带,照明灯等)。我们的讨论是通过对所报告的攻击的风险和更可取的安全性设计进行具体分析而得出的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号